From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Securing Communications in the Smart Home., и . EUC, том 3207 из Lecture Notes in Computer Science, стр. 891-902. Springer, (2004)Analysing the Security Threats against Network Convergence Architectures., , , , и . IAS, стр. 241-246. IEEE Computer Society, (2007)Performance Analysis of Cryptographic Protocols on Handheld Devices., , , и . NCA, стр. 169-174. IEEE Computer Society, (2004)TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments., , , и . GLOBECOM, стр. 1979-1984. IEEE, (2008)Managing Policies for Dynamic Spectrum Access., , , , , , , и . Autonomic Networking, том 4195 из Lecture Notes in Computer Science, стр. 285-297. Springer, (2006)Towards Flexible Authorization Management., и . ISCC, стр. 421-426. IEEE Computer Society, (2005)Ad Hoc Networks: Security., и . Encyclopedia of Wireless and Mobile Communications, (2008)Real-Time Intrusion Detection for Ad Hoc Networks., , и . WOWMOM, стр. 374-380. IEEE Computer Society, (2005)ÆTHER: an Authorization Management Architecture for Ubiquitous Computing., и . EuroPKI, том 3093 из Lecture Notes in Computer Science, стр. 246-259. Springer, (2004)Secure routing for mobile ad hoc networks., и . IEEE Commun. Surv. Tutorials, 7 (1-4): 2-21 (2005)